IHE IT Infrastructure Technical Framework White Paper 2006-2007 Cross-Enterprise User Authentication (XUA)
Total Page:16
File Type:pdf, Size:1020Kb
ACC, HIMSS and RSNA Integrating the Healthcare Enterprise 5 IHE IT Infrastructure Technical Framework White Paper 2006-2007 For Public Comment 10 Cross-Enterprise User Authentication (XUA) 15 IHE ITI Technical Committee Editor: John F. Moehrke 20 Version 2.0 2006-08-15 IHE ITI White Paper Cross-Enterprise User Authentication ______________________________________________________________________________ 25 Contents 1 Introduction............................................................................................................................ 4 2 Background............................................................................................................................ 5 2.1 Identity Enabled Services ................................................................................................ 5 2.2 SAML Assertion.............................................................................................................. 6 30 3 Healthcare Use cases ............................................................................................................. 7 3.1 Assumptions .................................................................................................................... 7 3.2 Use Case Categories......................................................................................................... 8 3.2.1 User Authentication (0a/b/c)............................................................................................................................... 8 3.2.2 HL7 Export/Import (1a)....................................................................................................................................... 8 35 3.2.3 HL7 Query (1b)..................................................................................................................................................... 9 3.2.4 DICOM Export/Import (2a) ................................................................................................................................ 9 3.2.5 DICOM Query (2b) .............................................................................................................................................. 9 3.2.6 XDS – Provide and Register (3)......................................................................................................................... 9 3.2.7 XDS – Register (4) .............................................................................................................................................. 9 40 3.2.8 XDS – Query (5) ................................................................................................................................................. 10 3.2.9 XDS – Retrieve (HTTP Get – Application) (6)............................................................................................. 10 3.2.10 RID – Display (HTTP Get – Browser) (7) ................................................................................................ 10 3.2.11 Sue views note (XDS) (5, 6, 7).................................................................................................................... 10 4 Actors / Transactions........................................................................................................... 11 45 4.1 Example EHR with XDS and XUA grouping................................................................. 11 4.2 XUA Integration Profile Process Flow........................................................................... 12 4.2.1 Post-Generated Assertion.................................................................................................................................. 13 4.2.2 Pre-Generated Assertion.................................................................................................................................... 14 4.2.3 XDS Provide and Register Delegation Model............................................................................................... 15 50 4.3 Access Controls.............................................................................................................. 15 4.4 Audit Logs ..................................................................................................................... 16 5 Guidance............................................................................................................................... 17 5.1 Trust Relationship......................................................................................................... 17 5.2 Assertion Content.......................................................................................................... 17 55 5.3 Enhanced Client or Proxy Profile .................................................................................. 18 5.4 Web SSO Profile ............................................................................................................ 18 5.5 Web Services Profile ...................................................................................................... 18 5.6 HL7 Profile .................................................................................................................... 19 5.7 DICOM Profile .............................................................................................................. 19 60 6 Conclusion............................................................................................................................ 20 7 GLOSSARY.......................................................................................................................... 21 8 Referenced Standard............................................................................................................ 22 __________________________________________________________________________ Rev. 2.0: PC – 2006-08-15 2 Copyright © 2006: ACC/HIMSS/RSNA IHE ITI White Paper Cross-Enterprise User Authentication ______________________________________________________________________________ OPEN ISSUES:............................................................................................................................ 24 __________________________________________________________________________ Rev. 2.0: PC – 2006-08-15 3 Copyright © 2006: ACC/HIMSS/RSNA IHE ITI White Paper Cross-Enterprise User Authentication ______________________________________________________________________________ 65 1 Introduction IHE has defined a profile for Enterprise User Authentication (EUA) and Personnel White Pages (PWP) for use within an enterprise. The IHE is now defining transactions that cross enterprise boundaries, specifically the XDS profile and others that create an Affinity Domain. When transactions cross enterprise boundaries the mechanisms found in the EUA and PWP profile are 70 insufficient and often nonfunctional. To provide accountability in these cross enterprise transactions there is a need to identify the requesting user in a way that the receiver can make access decisions and proper audit entries. This white paper proposes a Cross-Enterprise User Authentication (XUA) profile that will provide the user identity in transactions that cross enterprise boundaries. Enterprises may choose 75 to have their own user directory and their own unique method of authenticating. To provide accountability in these cross enterprise transactions there is a need to identify the requesting user in a way that the receiver can make access decisions and proper audit entries. The IHE has decided to publish this white paper instead of a Profile at this time. Although the use of SAML 2.0 Assertions is viewed as appropriate, there is a lack of experience with SAML 80 to understand the need for a Profile. We may need to specify the SAML Assertion content beyond specifying the use of SAML 2.0. We may also need a more complete support for the pre- authorized SAML assertion for many IHE transactions. There is much work going on in OASIS, WS-I, and Liberty Alliance that should fill some of these gaps. We now must decide if we are going to develop profiles that are unique to Healthcare, or wait and leverage the near future 85 standards work. __________________________________________________________________________ Rev. 2.0: PC – 2006-08-15 4 Copyright © 2006: ACC/HIMSS/RSNA IHE ITI White Paper Cross-Enterprise User Authentication ______________________________________________________________________________ 2 Background Security protects assets from risks. Information security protects information assets from risks to confidentiality, integrity and availability. Only through a security risk assessment and mitigation plan, executed at each design level, will information assets be appropriately protected. IHE is 90 now evaluating all Profiles in the context of a risk assessment plan to assure that risks are managed in the proper priority and with proper means. For more information on applying risk assessment strategy see the IHE web site for a white paper on risk assessment. The IHE profiles available today provided for distributed accountability that is tied together through the use of node-to-node authentication between systems that agree to handle access 95 controls and audit trails. Access control policies are becoming more complex. Systems are often built on architectures that are loosely coupled such as n-tier web-services. The result is that the user is further away from the data. An enterprise can impose a single authentication technology and a single personnel directory. Multiple enterprises that participate in an affinity domain may